Trend Micro Warns of Jeremy Lin Malware Campaign
The e-mails exploit a Microsoft Office vulnerability to drop malware identified as Bkdr_Meciv.LN.
Researchers at Trend Micro have uncovered a new spam campaign that trades on NBA star Jeremy Lin's growing popularity.
"The latest series of emails advertises the story of Jeremy Lin and comes with a Microsoft Word document entitled 'The incredible story of Jeremy Lin the NBA new superstar.doc,' identified by Trend Micro as Troj_Artief.LN," writes Softpedia's Eduard Kovacs. "This piece of malware exploits a vulnerability in Microsoft Office that was patched up by the Redmond company at the end of 2010. If the exploit is successful, a payload is dropped in the form of a backdoor named Bkdr_Meciv.LN."
"Once it steps into play, the malevolent element sends back information to its command and control server, including MAC address, IP, operating system version, language settings and a campaign code that allows the cybercriminals to track their attacks," Kovacs writes.
Go to "Jeremy Lin Malware Exploits Vulnerabilities in Microsoft Office" to read the details.
For regular security news updates, follow eSecurityPlanet on Twitter: @eSecurityP.